Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00063.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Intel
Subscribe
|
S2600cw2
Subscribe
S2600cw2 Firmware
Subscribe
S2600cw2r
Subscribe
S2600cw2r Firmware
Subscribe
S2600cw2s
Subscribe
S2600cw2s Firmware
Subscribe
S2600cw2sr
Subscribe
S2600cw2sr Firmware
Subscribe
S2600cwt
Subscribe
S2600cwt Firmware
Subscribe
S2600cwtr
Subscribe
S2600cwtr Firmware
Subscribe
S2600cwts
Subscribe
S2600cwts Firmware
Subscribe
S2600cwtsr
Subscribe
S2600cwtsr Firmware
Subscribe
S2600kp
Subscribe
S2600kp Firmware
Subscribe
S2600kpf
Subscribe
S2600kpf Firmware
Subscribe
S2600kpfr
Subscribe
S2600kpfr Firmware
Subscribe
S2600kpr
Subscribe
S2600kpr Firmware
Subscribe
S2600kptr
Subscribe
S2600kptr Firmware
Subscribe
S2600tp
Subscribe
S2600tp Firmware
Subscribe
S2600tpf
Subscribe
S2600tpf Firmware
Subscribe
S2600tpfr
Subscribe
S2600tpfr Firmware
Subscribe
S2600tpnr
Subscribe
S2600tpnr Firmware
Subscribe
S2600tpr
Subscribe
S2600tpr Firmware
Subscribe
S2600wt2
Subscribe
S2600wt2 Firmware
Subscribe
S2600wt2r
Subscribe
S2600wt2r Firmware
Subscribe
S2600wtt
Subscribe
S2600wtt Firmware
Subscribe
S2600wttr
Subscribe
S2600wttr Firmware
Subscribe
S2600wtts1r
Subscribe
S2600wtts1r Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4612 | Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-04T11:56:50.465Z
Reserved: 2020-04-28T00:00:00
Link: CVE-2020-12300
No data.
Status : Modified
Published: 2020-08-13T04:15:13.053
Modified: 2024-11-21T04:59:28.590
Link: CVE-2020-12300
No data.
OpenCVE Enrichment
No data.
EUVD